Security Assessment Use Cases

The following documents represent sample security assessment reports conducted using the FORTRESS Framework. These assessments demonstrate real-world application of physical security testing methodologies across various compliance frameworks including FedRAMP, HIPAA, and NIST SP 800-53.

Note: All client information, specific findings, and sensitive details have been redacted to protect confidentiality. These documents are provided for illustrative purposes to demonstrate the FORTRESS Framework's application in various compliance contexts.
CONFIDENTIAL - FOR AUTHORIZED PERSONNEL ONLY

Physical Security Assessment Report

Client Organization:
Assessment Date: 2024
Assessment Type: FedRAMP PE-2 Compliance Assessment
Assessor: Security Consulting
Report ID: FR--PE2-2024
Classification: Confidential

Executive Summary

This physical security assessment was conducted in accordance with FedRAMP PE-2 (Physical Access Authorizations) requirements to evaluate the effectiveness of physical access controls at facilities. The assessment scope included evaluation of visitor access procedures, employee authorization processes, and physical access control systems (PACS) implementation.

The assessment was performed over a day period from through , 2024. Testing activities included physical walkthroughs, access control system reviews, documentation analysis, and controlled access attempts at primary facilities located in .

Scope and Methodology

The assessment followed the FORTRESS Framework methodology, specifically addressing FedRAMP PE-2 control requirements:

  • PE-2.1: Physical access authorizations are issued to individuals before access is granted
  • PE-2.2: Physical access authorizations are reviewed and updated at least annually
  • PE-2.3: Physical access authorizations are revoked when access is no longer required

Testing methodologies included:

  • Review of physical access authorization policies and procedures
  • Examination of access control system configurations and user databases
  • Verification of authorization issuance and revocation processes
  • Testing of visitor management procedures
  • Review of access logs and audit trails

Key Findings

Finding ID Description Severity FedRAMP Control
FR-PE2-001 Physical access authorization database contains inactive user accounts that have not been reviewed in over 12 months, violating PE-2.2 annual review requirement. HIGH PE-2.2
FR-PE2-002 Visitor access procedures at facility do not require pre-authorization for all visitor types, potentially allowing unauthorized physical access. MEDIUM PE-2.1
FR-PE2-003 Access revocation process lacks automated notification to physical security personnel when employee termination occurs, creating a window of potential unauthorized access. MEDIUM PE-2.3
FR-PE2-004 Access control system at secondary facility does not maintain complete audit logs of authorization changes, limiting accountability. LOW PE-2

Recommendations

Based on the assessment findings, the following recommendations are provided to achieve full FedRAMP PE-2 compliance:

  • Immediate Action Required: Conduct comprehensive review of all physical access authorizations and remove inactive accounts within days.
  • Implement automated quarterly access reviews to ensure PE-2.2 compliance is maintained on an ongoing basis.
  • Update visitor management procedures to require pre-authorization for all visitor categories, including contractors and temporary personnel.
  • Establish automated integration between HR systems and physical access control systems to ensure immediate revocation upon employee termination.
  • Enhance audit logging capabilities to capture all authorization changes, including who authorized the change and when it occurred.

Conclusion

While has implemented foundational physical access authorization controls, several gaps were identified that prevent full compliance with FedRAMP PE-2 requirements. The organization should prioritize remediation of high-severity findings FR-PE2-001 and FR-PE2-002 to maintain FedRAMP authorization status. With implementation of the recommended controls, the organization should achieve full PE-2 compliance within months.

This report contains confidential and proprietary information. Distribution is restricted to authorized personnel only. Unauthorized disclosure may result in legal action. Report prepared in accordance with FORTRESS Framework v9.0.

CONFIDENTIAL - FOR AUTHORIZED PERSONNEL ONLY

HIPAA Physical Safeguards Assessment

Covered Entity:
Assessment Date: 2024
Assessment Type: HIPAA §164.310(a)(1) & (b) Compliance
Assessor: Security Consulting
Report ID: HIPAA--164.310-2024
Classification: Confidential

Executive Summary

This assessment evaluated physical safeguards implementation at , a healthcare organization subject to HIPAA regulations. The assessment focused on compliance with §164.310(a)(1) - Facility Access Controls and §164.310(b) - Workstation Use requirements, which mandate physical protections for electronic protected health information (ePHI).

The assessment was conducted at facilities across states, including primary data centers, medical offices, and administrative facilities. Testing occurred from through , 2024.

Scope and Methodology

Assessment activities addressed the following HIPAA requirements:

  • §164.310(a)(1) - Facility Access Controls: Implementation of physical safeguards to limit access to facilities where ePHI is stored or processed
  • §164.310(b) - Workstation Use: Implementation of physical safeguards for workstations that access ePHI

Testing methodologies included:

  • Physical security walkthroughs of facilities housing ePHI systems
  • Review of access control systems and visitor management procedures
  • Evaluation of workstation physical security controls
  • Testing of physical barriers and environmental controls
  • Review of policies and procedures documentation
  • Verification of workforce training on physical safeguards

Key Findings

Finding ID Description Severity HIPAA Section
HIPAA-164.310-001 Medical records storage room at facility lacks proper access controls. Room is accessible via key that is not tracked or logged, violating facility access control requirements. HIGH 164.310(a)(1)
HIPAA-164.310-002 Workstations in department are positioned such that ePHI is visible to unauthorized individuals passing through common areas, violating workstation use requirements. HIGH 164.310(b)
HIPAA-164.310-003 Data center housing ePHI servers lacks visitor escort procedures. visitors were observed unescorted during assessment period. MEDIUM 164.310(a)(1)
HIPAA-164.310-004 Workstation use policies do not address physical security requirements for mobile devices and laptops that access ePHI outside of primary facilities. MEDIUM 164.310(b)
HIPAA-164.310-005 Access logs for facility are retained for only days, which may be insufficient for audit purposes. LOW 164.310(a)(1)

Recommendations

To achieve full compliance with HIPAA §164.310(a)(1) and (b), the following remediation activities are recommended:

  • Immediate Action Required: Implement electronic access control system for medical records storage areas, replacing unlogged key access. System should log all access attempts and integrate with employee database.
  • Reposition workstations displaying ePHI to prevent unauthorized viewing. Consider privacy screens, workstation placement adjustments, or physical barriers.
  • Establish mandatory visitor escort procedures for all areas containing ePHI systems. All visitors must be escorted by authorized personnel at all times.
  • Update workstation use policies to include physical security requirements for mobile devices, including laptop locks, secure storage requirements, and screen lock policies.
  • Extend access log retention to minimum of months to support audit and investigation requirements.
  • Conduct annual workforce training on physical safeguards requirements, including workstation use policies and facility access procedures.

Conclusion

has implemented basic physical safeguards, but several critical gaps were identified that could result in unauthorized access to ePHI. The organization should prioritize remediation of findings HIPAA-164.310-001 and HIPAA-164.310-002, as these represent direct violations of HIPAA physical safeguard requirements. Implementation of recommended controls should be completed within days to minimize risk of HIPAA violations and potential regulatory action.

This report contains confidential and proprietary information. Distribution is restricted to authorized personnel only. Unauthorized disclosure may result in legal action. Report prepared in accordance with FORTRESS Framework v9.0.

CONFIDENTIAL - FOR AUTHORIZED PERSONNEL ONLY

NIST SP 800-53 PE-3 Physical Access Control Assessment

Organization:
Assessment Date: 2024
Assessment Type: NIST SP 800-53 PE-3 Compliance
Assessor: Security Consulting
Report ID: NIST--PE3-2024
Classification: Confidential

Executive Summary

This assessment evaluated physical access control implementation at in accordance with NIST Special Publication 800-53 Revision 5, Control PE-3 (Physical Access Control). The assessment focused on the organization's ability to enforce physical access authorizations through physical access control systems, guards, and access control points.

The assessment was conducted at facilities, including data centers, office locations, and remote sites. Testing activities occurred from through , 2024, and included both technical testing and policy review.

Scope and Methodology

The assessment addressed NIST SP 800-53 PE-3 control requirements:

  • PE-3.1: Enforce physical access authorizations at entry/exit points
  • PE-3.2: Maintain physical access audit logs
  • PE-3.3: Control physical access to information system components
  • PE-3.4: Escort visitors and monitor visitor activity
  • PE-3.5: Secure keys, combinations, and other physical access credentials

Testing methodologies included:

  • Physical penetration testing of access control systems
  • Review of physical access control system (PACS) configurations
  • Evaluation of guard procedures and visitor management
  • Testing of badge systems, biometric readers, and other access control mechanisms
  • Review of access logs and audit trail completeness
  • Assessment of key management and credential storage procedures
  • Testing of emergency access procedures

Key Findings

Finding ID Description Severity NIST Control
NIST-PE3-001 Access control system at data center failed to enforce access authorizations during of test attempts. System allowed access with expired badges and did not properly validate authorization status. HIGH PE-3.1
NIST-PE3-002 Physical access audit logs are not retained for the minimum required months. Current retention is months, violating PE-3.2 requirements. MEDIUM PE-3.2
NIST-PE3-003 Server room at facility lacks proper access controls. Door can be opened with key that is not tracked in access control system, violating PE-3.3 requirements. HIGH PE-3.3
NIST-PE3-004 Visitor escort procedures at facility are not consistently enforced. unescorted visitors were observed during assessment period. MEDIUM PE-3.4
NIST-PE3-005 Master keys and access codes for facilities are stored in unsecured location accessible to personnel, violating PE-3.5 credential security requirements. HIGH PE-3.5
NIST-PE3-006 Emergency access procedures do not require post-access review or documentation, creating accountability gaps. LOW PE-3

Recommendations

To achieve full compliance with NIST SP 800-53 PE-3, the following remediation activities are recommended:

  • Immediate Action Required: Upgrade access control system at data center to properly validate authorization status in real-time. System must reject expired, revoked, or unauthorized credentials.
  • Extend physical access audit log retention to minimum months as required by NIST SP 800-53. Implement automated archival system to ensure logs are preserved.
  • Replace mechanical key access to server rooms with electronic access control systems that integrate with centralized PACS and maintain audit logs.
  • Implement mandatory visitor escort procedures with automated tracking. All visitors must be logged, escorted, and monitored throughout their visit.
  • Secure all physical access credentials (keys, access codes, keycards) in locked, access-controlled storage. Implement key management procedures including inventory, assignment tracking, and regular audits.
  • Establish emergency access procedures that require immediate post-access documentation and management review within hours of emergency access.
  • Conduct quarterly access control system testing to verify proper enforcement of access authorizations.

Conclusion

While has implemented physical access controls, several critical deficiencies prevent full compliance with NIST SP 800-53 PE-3 requirements. The organization should immediately address high-severity findings NIST-PE3-001, NIST-PE3-003, and NIST-PE3-005, as these represent significant security risks that could allow unauthorized physical access to information systems. With implementation of the recommended controls, the organization should achieve full PE-3 compliance within months.

This report contains confidential and proprietary information. Distribution is restricted to authorized personnel only. Unauthorized disclosure may result in legal action. Report prepared in accordance with FORTRESS Framework v9.0.

About These Use Cases

These sample assessment reports demonstrate the FORTRESS Framework's application across different compliance frameworks and organizational contexts. Each assessment follows the structured methodology defined in the FORTRESS Framework, ensuring comprehensive coverage of physical security controls while maintaining consistency and repeatability across engagements.

Key Features Demonstrated:

  • Structured assessment methodology aligned with compliance requirements
  • Comprehensive testing of physical access controls
  • Detailed findings with severity classifications
  • Actionable remediation recommendations
  • Compliance mapping to specific control requirements

For more information about the FORTRESS Framework or to explore the interactive navigator, visit the Framework Navigator.